First published: Wed Mar 22 2023(Updated: )
When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/tomcat | <8.5.86 | 8.5.86 |
redhat/tomcat | <9.0.72 | 9.0.72 |
redhat/tomcat | <10.1.6 | 10.1.6 |
redhat/tomcat | <11.0.0 | 11.0.0 |
IBM Watson Knowledge Catalog | <=4.x | |
Tomcat | >=8.5.0<8.5.86 | |
Tomcat | >9.0.0<9.0.72 | |
Tomcat | >10.1.0<10.1.6 | |
Tomcat | =11.0.0-milestone1 | |
Tomcat | =11.0.0-milestone2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-28708
The severity of CVE-2023-28708 is high with a score of 7.5.
This vulnerability occurs when using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https.
Apache Tomcat versions 8.5.0 to 8.5.85, 9.0.0-M1 to 9.0.71, 10.1.0-M1 to 10.1.5, and 11.0.0-M1 to 11.0.0.-M2 are affected by this vulnerability.
To fix CVE-2023-28708, update Apache Tomcat to version 8.5.86, 9.0.72, 10.1.6, or 11.0.0 or later.